Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
82712916212b0afb091628ef6e504807_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
82712916212b0afb091628ef6e504807_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
82712916212b0afb091628ef6e504807_JaffaCakes118.exe
-
Size
659KB
-
MD5
82712916212b0afb091628ef6e504807
-
SHA1
7d3ca67ac52e82dc4b3b6cafa44ed5dba4524182
-
SHA256
b960eebf53fcd2e17332eebc70391b29cd31445fdcdf5ea134c57ebf7bef4fb0
-
SHA512
cde1013d9b4000c56b5ef748212abe25a66d94d5502145f65fb534d49665c09c37d343d96f3481b3d82d80cdc0d3ed8518da4c091c74b09c87a4c8754656726d
-
SSDEEP
6144:EhYsafa0idunTIPDan9xTy2VTk0xfdI3QPTYiEYKB6eTBh+:EWlfiunTIe9hTk0xlI30TYUHeT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2644 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kuXRfEC\svchost.exe 82712916212b0afb091628ef6e504807_JaffaCakes118.exe File created C:\Windows\SysWOW64\kuXRfEC\svchost.exe 82712916212b0afb091628ef6e504807_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\PysIwLR.dll 82712916212b0afb091628ef6e504807_JaffaCakes118.exe File created C:\Windows\vSeGkYKY.dll svchost.exe File created C:\Windows\jdnrJDNj\oANPXcHB.dll svchost.exe File opened for modification C:\Windows\jdnrJDNj\oANPXcHB.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2348 2696 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82712916212b0afb091628ef6e504807_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2696 svchost.exe 2696 svchost.exe 2696 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2696 2644 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2696 2644 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2696 2644 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 30 PID 2644 wrote to memory of 2696 2644 82712916212b0afb091628ef6e504807_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2348 2696 svchost.exe 31 PID 2696 wrote to memory of 2348 2696 svchost.exe 31 PID 2696 wrote to memory of 2348 2696 svchost.exe 31 PID 2696 wrote to memory of 2348 2696 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\82712916212b0afb091628ef6e504807_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\82712916212b0afb091628ef6e504807_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\kuXRfEC\svchost.exe"C:\Windows\SysWOW64\kuXRfEC\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 3843⤵
- Loads dropped DLL
- Program crash
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD5b352f6d330ec465793661545bb65a69a
SHA1b8b753e664fb49a7429b48648c6dcec14fee0e26
SHA2566cfae274b2f60394b8e1cfb10cf7e31515e89e3c2857a10578dfff40ec251334
SHA5125a4b1ea8a01d8a960b8c47a99315635179676857c1b60a53256b03069fb61a7a50a925f306cf8d3ad33e348cb7dc817a331bb5bb06b22666fda1c411c0e8b3d2